I do wish plex would respond to this, or add this feature/functionality , at some point soon… It really is a security risk / security issue that should be addressed or at a minimum discussed further here. While drinehart does bring up some points of discussion / thought- im hopeful others will discuss this issue, and further options as well (or add some more points of view).
There arent many scenarios in 2017/2018 where use of a “home-type” of service/app (that is still under active development) requires users to add public facing, open ports. Plex is one of those, so further discussion/thought (and possible better methods to accomplish the same goal) are important and worth having.
In light of the concerns / points drinehart brings up, i still feel, for Plex Server, the use of (by default) OR the additional option of, TCP/UDP hole punching, would be a much more secure method of allowing home server access , than the current method of requiring a port open to the public internet.
(btw, the IP addrss restriction that plex server offers is a good feature, but to be clear it does not address nor mitigate the security threats im referencing, as even if a non plexServer-whitelisted IP address, attempts to access your server IP:port- they still have access to the Server (and can attempt any potential exploits). As the Plex Server side IP whitelist only affects ability to authenticate. Another way of saying this is the plex server IP whitelist is not like a separate firewall IP ACL, ie even a plex-server blacklisted IP address still gets the web “welcome to plex server, enter your login/pass, please” interface").
Some Further replies to drienhart’s points:
1- while a Hole-punch type architecture/setup could make Plex’s server more attractive as a “prize” for hackers looking to leverage services for dDOS types of attacks:
A- Plex would be a much worse type of target for this compared to devices/cloud servers such as; Google Nest, or Dahua CCTV DVRs. As Both of those physical devices + Services use hole punching, but have MANY more end points / potential attack devices. (in drienhart’s example, MANY more devices from which to maliciously “cloud instruct” to send dDOS type attacks FROM. ie # of nest thermostats “in the wild” VS # of plex servers “in the wild”). Also i feel that home users would be much quicker to notice that their plex server was sending out dDOS attacks , versus their Nest thermostat (or other “cloud insturcted” IOT type device in the home)
B- Plex would now be able to respond to any security issues, on their “cloud” end (as it would be an attack on their cloud server , which they can easily monitor and patch). Versus the current model/current scenario of: IF an exploit/vuln IS EVEN disclosed to the public, THEN it is now up to each and every user to update their Plex servers- and in any mean time of not applying update, each and every user is still vulnerable, and easily able to be located ( ie via port scan/masscan 0.0.0.0/0 tcp32400 )
Those points aside (and no disrespect to drienharts) , i really dont feel the issues/threats he brings up are good “reasons against” a hole-punch type system vs the current “client open-port type system.” However there may be good reasons aginst my suggested hole-punch type system, which i why i hope others w sec. backgrounds will discuss here.
Thanks